Sciweavers

2200 search results - page 222 / 440
» The Generalized Pignistic Transformation
Sort
View
ISCI
2007
135views more  ISCI 2007»
15 years 26 days ago
Generalising the array split obfuscation
An obfuscation is a behaviour-preserving program transformation whose aim is to make a program “harder to understand”. Obfuscations are mainly applied to make reverse engineer...
Stephen Drape
JLP
2007
114views more  JLP 2007»
15 years 25 days ago
Deaccumulation techniques for improving provability
Several induction theorem provers were developed to verify functional programs mechanically. Unfortunately, automatic verification often fails for functions with accumulating arg...
Jürgen Giesl, Armin Kühnemann, Janis Voi...
JSAC
2007
102views more  JSAC 2007»
15 years 25 days ago
Partially-coherent distributed space-time codes with differential encoder and decoder
Abstract— Distributed space-time coding is a means of achieving diversity through cooperative communication in a wireless relay network. In this paper, we consider a transmission...
T. Kiran, B. Sundar Rajan
JUCS
2007
91views more  JUCS 2007»
15 years 25 days ago
Generative Instructional Engineering of Competence Development Programmes
: Competence development programmes are collections of units of learning and learning activities used to increase the overall effective performance of a learner within a certain ta...
Juan Manuel Dodero, Salvador Sánchez Alonso...
TIP
2011
99views more  TIP 2011»
14 years 8 months ago
Light Field Analysis for Modeling Image Formation
—Image formation is traditionally described by a number of individual models, one for each specific effect in the image formation process. However, it is difficult to aggregate...
Chia-Kai Liang, Yi-Chang Shih, Homer H. Chen